Bill H. Email and Phone Number
Bill H. work email
- Valid
- Valid
Bill H. personal email
- Valid
- Valid
Author: "21st Century Chinese Cognitive Warfare: 21世紀中國認知戰" - 2024https://www.amazon.com/21st-Century-Chinese-Cognitive-Warfare/dp/B0DD3GMV5T/Internationally recognized cyber intelligence subject matter expert, providing multi-cultural threat intelligence on global nation state cyber warfare attacks & information warfare initiatives. Clients include global 50 companies across all industries including healthcare, manufacturing, oil & gas, international defense, other governmental agencies (OGA) and cyber threat intelligence. - Achieved significant advanced cyber network security formal education & international field experience- Conducted numerous CLASSIFIED cyber, physical and social engineering threat & vulnerability assessments worldwide for a variety of commercial & other governmental agencies (OGA)- Developed & led cross functional cyber & information security teams in challenging environments- Extensive international experience & expertise covering all aspects of cyber & information security- Internationally registered white hat hacker - https://www.soldierx.com/hdb/Bill-H - Named one of “20 Cyber Policy Experts to Follow On Twitter” https://www.forbes.com/sites/richardstiennon/2014/04/07/20-cyber-policy-experts-to-follow-on-twitter/#640271bf6538
Red Dragon 1949 // 紅龍1949年
View- Website:
- reddragon1949.com
- Employees:
- 2
-
Chinese Diplomatic, Information And Intelligence, Military And Economic ResearcherRed Dragon 1949 // 紅龍1949年Saint Paul, Mn, Us -
Chief Threat Intellligence OfficerTechnology By Design, Llc Dec 2024 - PresentMinneapolis, Minnesota, UsChief Threat Intellligence OfficerStrategic Leadership • Develops and implements global threat intelligence strategy • Provides regular cyber and geopolitical threat updates to senior management • Assesses global threat trends and formulates long-term intelligence policies • Reports directly to CEO on intelligence mattersOperational Management • Oversees real-time threat detection and response mechanisms • Directs daily threat intelligence activities and data analysis • Conducts risk assessments and devises countermeasures • Synthesizes intelligence from multiple sources into unified threat picturesTeam Development • Leads and mentors threat intelligence professionals • Establishes intelligence standards and tradecraft • Enforces analytic standards based on industry best practices • Coordinates intelligence sharing between internal teamsExternal Engagement • Collaborates with government agencies and cybersecurity communities • Participates in information sharing initiatives • Maintains relationships with external intelligence partners • Represents organization in security forumsRisk Management • Evaluates emerging threats to organizational assets • Supports incident response operations • Provides actionable intelligence for risk reduction • Develops proactive threat mitigation strategies -
Visiting Research FellowKnowfar Institute For Strategic And Defence Studies (Kisds) Dec 2015 - PresentVisiting Research Fellow at Knowfar Institute for Strategic and Defence Studies (KISDS)
-
專業軍事訓練信息交換 - 多文化環境下的聯合軍事計劃Knowfar Institute For Strategic And Defence Studies (Kisds) Apr 2018 - Apr 20182 Day Course - 專業軍事訓練信息交換 - 多文化環境下的聯合軍事計劃
-
專業軍事訓練信息交換 - 打擊恐怖主義Knowfar Institute For Strategic And Defence Studies (Kisds) Apr 2018 - Apr 2018專業軍事訓練信息交換 - 打擊恐怖主義
-
中國平民網絡戰爭遊戲 - 中華人民共和國上海Knowfar Institute For Strategic And Defence Studies (Kisds) Nov 2017 - Nov 2017中國平民網絡戰爭遊戲 - 中華人民共和國上海
-
中國軍事網絡戰爭遊戲 - 北京,中華人民共和國Knowfar Institute For Strategic And Defence Studies (Kisds) Nov 2017 - Nov 2017中國軍事網絡戰爭遊戲 - 北京,中華人民共和國
-
Featured InstructorKnowfar Institute For Strategic And Defence Studies (Kisds) Dec 2015 - Dec 2015Featured Instructor - Japanese Cyber Warfare Evolution
-
Cyber Warfare AdvisorUnited States Marine Corps Dec 2021 - Dec 2024Washington, Dc, UsProvide CLASSIFIED & UNCLASSIFIED warfighting support to forward deployed operational forces. -
International Field Experienced Cyber Warfare Officer & Independent Information Security EngineerRed Dragon 1949 Aug 2010 - Dec 2024Internationally recognized cyber intelligence subject matter expert, providing multi-cultural threat intelligence on global nation state cyber warfare attacks & information warfare initiatives. Clients include global 50 companies across all industries including healthcare, manufacturing, oil & gas, international defense, other governmental agencies (OGA) & cyber threat counter- intelligence activities.- Achieved significant advanced cyber network security formal education and international field experience- Conducted numerous CLASSIFIED cyber, physical and social engineering threat & vulnerability assessments worldwide for a variety of commercial & other governmental agencies (OGA)- Developed & led cross functional cyber & information security teams in challenging environments- Extensive international experience & expertise covering all aspects of cyber & information security- Internationally registered white hat hacker - https://www.soldierx.com/hdb/Bill-H - Named one of “20 Cyber Policy Experts to Follow On Twitter” https://www.forbes.com/sites/richardstiennon/2014/04/07/20-cyber-policy-experts-to-follow-on-twitter/#640271bf6538 Significant current international working experience, across a significant number of countries. Lived in & conducted business globally since 1979, currently consulting with multi-national corporations, foreign military intelligence, counter-intelligence and defense ministerial organizations regarding strategic mitigation of specific nation state & other computer network attacks (CNA) and computer network exploits (CNE); colloquially known as offensive & defensive cyber operations.
-
Cyber Threat IntelligenceA Medical Device Manufacturer Oct 2018 - Oct 2022- Created a global cyber threat intelligence program focused on implanted cardiac medical devices- Created an adversary to allies program, embracing the independent security researcher world- Developed, maintained & exploited cyber threat intelligence relationships within international hacking community- Collected, curated & delivered daily, weekly & monthly cyber threat intelligence products & briefings
-
Opening Keynote SpeakerInformation Systems Security Association - Uk Chapter (Issa-Uk) Jun 2022 - Jun 2022London, GbOpening Keynote Speakerhttps://www.eventbrite.co.uk/e/pitch-on-the-ship-2022-tickets-185728718597 -
Day One Closing Keynote: China'S Use Of Computers As A Strategic Weapon SystemCybernow Summit (Cns) May 2022 - May 2022CyberNow Summit (CNS)Day One Closing Keynote: China's Use of Computers as a Strategic Weapon Systemhttps://pheedloop.com/EVEYAJARDOOFM/site/home/
-
Featured Foreign Military Cyber Warfare Speaker - People'S Republic Of ChinaBath Spa University Apr 2022 - Apr 2022Bath, GbFeatured Foreign Military Cyber Warfare Speaker - People's Republic of Chinahttps://www.bathspa.ac.uk/courses/pg-cyber-security/ -
Featured Speaker - International Cyber Warfare ConcernsGisec Global Mar 2022 - Mar 2022Dubai, Dubai, AeFeatured Speaker - International Cyber Warfare Concerns https://gisec.ae/Agenda2022.aspx?SeminarName=GOVERNMENT-STAGE -
Adjunct Professor Critical National Infrastructures And National Security (Cyb 633)Utica University Jan 2018 - Mar 2022Instruct graduate students through practical international field experience and actionable information from real world activities, an emphasis on United States Critical National Infrastructures and National Security.
-
Adjunct Professor - Cyber Intelligence (Cyb 610)Utica College Aug 2017 - Mar 2022The Cyber Intelligence course (CYB 610) provides students with an in-depth analysis of cyber, information and the collective application of both concepts which are of significant importance to national security and pro-active defense in cyberspace. The CYB 610 course covers activities of intelligence, taxonomy of information elements, functional aspects of each intelligence category, national intelligence & international contextual production resources. CYB 610 also examines concepts of cyber terrorism and cyberwar and relation to cyber intelligence. Key concepts of counter-intelligence and cyberwar will be applied to socio-economic, military, political and strategic national defense. Key concepts of the course, listed above, will be an educational foundation for binary and field collection techniques critically important in today’s asymmetric binary battlefield environment.
-
AdvisorBiohacking Village, Defcon Dec 2019 - Feb 2022Provide cybersecurity engineering advice, strategic advisory and serve as volunteer coordinator - If you want to attend a DEFCON Village with behind the scenes access please get in contact with me.https://www.villageb.io/I'll be at RSA 202 - an opportunity to experience the BioHacking Village and sign up for supporting this year's DEFCON initiative!
-
Featured International Speaker -Cyber Attacks & National Critical InfrastructureC0C0N 2021 Nov 2021 - Nov 2021Kochi, Kerala, InAn Indian Hacking Conference - Cyber Attacks & National Critical Infrastructurehttps://india.c0c0n.org/2021/speakers https://india.c0c0n.org/2021/agenda -
Panel Moderator - Hack In The Box (Hitb) Abu Dhabi, United Arab EmiratesHack In The Box (Hitb) Nov 2021 - Nov 2021Kuala Lumpur, Wp, MyPanel Moderator - Hack in the Box (HiTB) Abu Dhabi, United Arab Emirates38 Degrees Healthcare in Crisis https://www.youtube.com/watch?v=lsJ5RapxjJI@ Minute 2:34:57 -
Featured Foreign Military SpeakerHack In The Box (Hitb) Nov 2021 - Nov 2021Kuala Lumpur, Wp, MyAuthor and security tech professional, Bill Hagestad, returns to #HITBCyberWeek to discuss the evolving cyber threat landscape in the GCC and its potential impact on the region. Catch his talks on 24 and 25 November.Register today to attend his talk in-person or virtually: cyberweek.ae/2021/attend #CyberWeek #HITBConference #HackInTheBox #ADNEChttps://www.facebook.com/hackinthebox/ -
Malicious Life Podcast: China'S Unrestricted Cyberwarfare Part 1 // Featured Podcast Malicious LifeCybereason May 2021 - Jul 2021San Diego, California, UsMalicious Life Podcast: China's Unrestricted Cyberwarfare Part 1 // Featured Podcast Malicious Life -
Malicious Life Podcast: China'S Unrestricted Cyberwarfare Part 2// Featured Podcast Malicious LifeCybereason May 2021 - Jun 2021San Diego, California, UsMalicious Life Podcast: China's Unrestricted Cyberwarfare Part 1 // Featured Podcast Malicious Life https://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-2? -
Malicious Life Podcast: China'S Unrestricted Cyberwarfare Part 3 // Featured Podcast MaliciousCybereason May 2021 - Jun 2021San Diego, California, UsMalicious Life Podcast: China's Unrestricted Cyberwarfare Part 3 // Featured Podcast Malicioushttps://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-2? -
Featured Chinese Military Cyber/Information Operations BrieferHttps://Mc.Nato.Int/ Jun 2021 - Jun 2021Featured Chinese Military Cyber/Information Operations Briefer https://mc.nato.int/
-
Intelligence: China & Russia A Unique Look Closing Keynote Atlantic Forum Spring Conference #Nato72Atlantic Forum Spring Conference #Nato72 Apr 2021 - Apr 2021Intelligence: China & Russia a Unique LookClosing Keynote Atlantic Forum Spring Conference #NATO72 at Atlantic Forum Spring Conference #NATO72https://atlantic-forum.com/events/atlantic-forum-spring-conference-nato72
-
Guest Lecturer - China'S Use Of Computers As A Strategic Weapon SystemNordhoff Technical University Apr 2021 - Apr 2021China's Use of Computers as a Strategic Weapon System
-
Opening Keynote Panel - Collaboration - The Secret Of Criminal SuccessB-Sides Brisbane Dec 2020 - Dec 2020Brian Hay (former Operational Commander, Fraud and Cyber Crime, QPS), Ret. Lt Colonel Bill Hagestad II (expert in Chinese Cyber Espionage), and Professor Jonathan Rusch (former US Dept of Justice and Chair of the Presidential Identity Theft Committee and Chair of the International Mass Marketing Fraud Working Group), for our keynote presentation on the secret of criminal success.https://bsidesbrisbane.com/pages/schedule.html#
-
Locknote Speaker - 8.8 Ff.Aa. Computer Security Conference8.8 Ff.Aa. Computer Security Conference Oct 2020 - Oct 2020Locknote Speaker - 8.8 FF.AA. Computer Security ConferenceMilitary focused cybersecurity conference
-
Keynote Speaker - Mind The SecMind The Sec Sep 2020 - Sep 2020Guerra Militar Cibernética Chinesa. Efeitos, Impactos e Consequências para a América do Sul DescriçãoDurante a palestra "Guerra Militar Cibernética Chinesa - Efeitos, Impactos e Consequências para a América do Sul", participantes vão aprender sobre os últimos desenvolvimentos em guerra cibernética, incluindo guerras sem limites (guerra irrestrita), iniciativas de informatização e onde a América do Sul se encaixa nos planos globais da República Popular da China.https://www.mindthesec.com.br/meetings/virtual/JzXNKteeeN6QxbrBo
-
Chinese Cyber Espionage - Auscert 2020Auscert Sep 2020 - Sep 2020Brisbane, Queensland, AuChinese Cyber EspionageNB. This presentation will be Traffic Light Protocol RED, so please plan accordingly.Attendees will receive a field experience based journey into the heart of the People's Republic of China cyber espionage.Programs such as 863—National High-Tech Research and Development Plan <<863——国家高技术研究发展计划>> & the strategic diplomatic, intelligence,military and economic impacts on Australia will be reviewed.Bill will bring you face-to-face with Chinese military authors of "Unrestricted Warfare", Chinese hackers, and the tactical hacking techniques they have used to attack Canberra and Australia's national security.https://conference.auscert.org.au/speaker/bill-hagestad/ -
Keynote SpeakerI-4 Sep 2020 - Sep 2020Closing Keynote
-
Defcon - Speech // Biohacking Village -Chinese Military Bio-Weapons Laboratory Mission: Op Covid-19Biohacking Village Aug 2020 - Aug 2020Washington, Dc, UsChinese Military Bio-Weapons Laboratory Mission: OP COVID-19 // 中國軍事生物武器實驗室任務 結論…Conclusions…一个. Wuhan virus was not man made…两. Chinese researchers not so sure…Chinese commentary indicates military source三个. Chinese military response to Wuhan as epicenter…is curiously compelling四个. Consistent Communist Chinese rhetoric blames US DoD for virus五个. China is cooperating with Gulf Cooperation Council countries – e.g. United Arab Emirates… 六个. Chinese military used as test subject for anti-virus – notably no civilian use yet, perhaps Xinjiang七个. China redirecting virus source narrative towards US elections….八个. China optimistic about global leadership role in face of failing US -
Chinese Military Combined Arms Effects - Bio-WeaponsBio-Hacking Village, Defcon Aug 2019 - Aug 2019"Chinese Military Combined Arms Effects - Bio-Weapons" a field experience based discussion from within the People's Republic of China regarding the People's Liberation Army's use of bio-weapons.https://www.villageb.io/schedules
-
Threat Operation Center (Toc) Manager, Middle Eastern Nation State Military Cyber CommandMiddle Eastern Nation State Military Cyber Command Apr 2018 - Sep 2018- Led a multi-national TOC Team comprised of 10 threat analysts in a Middle Eastern military cyber warfare center;- Architected, designed, engineered a foreign military threat operations center capability- Implemented a TOC architecture emphasizing a Malware Information Sharing Platform (MISP), a secure Intelligence Gathering Platform (IGP), Threat Intelligence Platform (TIP) and Threat Intelligence Library (TIL)- Advised, guided, & instruct foreign military cyber warfare cadre in passive & active threat intelligence collection- Led training instruction in identifying, research & exploit of active intelligence targets faced by a Middle Eastern military cyber warfare center- Developed an active & passive cyber threat intelligence program based upon MITRE's ATT&CK Matrix- Utilized ASCOPE, PMSEEII, DIME, Diamond methodologies to facilitate cyber warfare adversary threat situational awareness- Created a military environment cyber risk assessment methodology using CVSS v 3.0, OPSWAT RA & NIST SP 800-30 - Researched, designed, edited & wrote TOC concept of operations (CONOPs)- Researched, designed, edited & wrote Open Source Intelligence (OSINT) standard operating procedure (SOP)- Researched, designed, edited & wrote a 360-page TOC Standard Operating Procedure for use by a Middle Eastern military in the execution, collection & exploitation of both active & passive intelligence collection
-
Senior Principal Cyber Security EngineerSmiths Medical Mar 2016 - Mar 2018Created, designed and functionally carried out a medical device cyber security engineering program within a medical device company with no budget and no team. Responsible for 15 distinct areas with pre-market & post-market cyber security engineering advisory, design within legacy and next generation network connected medical devices. Created, designed and implemented a rigorous cyber risk and vulnerability assessment methodology using the Food & Drug Administration Cyber Division suggested assessment methodologies based upon both the Common Vulnerability Scoring Subsystem (CVSS) Version 3.0 and NIST Special Publication 800-30 Revision 1.0 2012 Guide for ConductingRisk Assessments.Received an Innovator';s Excellence Award for designing this cyber risk assessment methodology.Recruited and created multi-disciplinary Cyber Security Engineering Tiger Team's to meet the demand for organizational cyber security engineering.Created, design and led cyber security war game table top exercises (TTX) for the FDA Cyber Division and brought competitor cyber security engineering teams together to collaborate, communicate and cooperate towards building cyber resilient standards for cyber security of medical devices all while ensuring patient safety.Received an Organizational Excellence Award for these Cyber War Game TTX industry events.
-
Mentor - College Of Science & EngineeringUniversity Of Minnesota Aug 2013 - Aug 2017Minneapolis And St. Paul, Minnesota, UsProvide mentorship to graduate students @ College of Science & Engineering. -
Instructor - Security Technologies : Nation States Cyber ConflictUniversity Of Minnesota Jun 2011 - Jun 2014Minneapolis And St. Paul, Minnesota, Us- Provide strategic focus on nation state cyber security to students;- Emphasis on international case studies related to cyber attacks, cyber espionage, data ex-filtration among others;- Descriptive teachings on international government use of cyber warfare to manifest policy;- Distinct case studies related to military use of information warfare (IW) to carry out governmental cyber war policies;- Cause and effect analysis of nationalistic use of computer hacking by civilians;- Second and third order effects of commercial entities using corporate cyber espionage; - Specific focus on the People's Republic of China, Taiwan, Hong Kong, Japan, North Korea and South Korea. -
Featured Guest Lecturer - Chinese Internet Security & Cyber SovereigntyUtica College Jun 2017 - Jun 2017Featured Guest Lecturer - Chinese Internet Security & Cyber Sovereignty - Graduate level discussion based upon recent field experience within the People's Republic of China - an emphasis of the latest Communist Chinese Government Law & policy: 中國新的網絡安全法 // INTERNET SECURITY LAW OF THE PEOPLE ‘S REPUBLIC OF CHINA. Referring URL: http://www.reddragon1949.com/
-
Featured Foreign Cyber Security Keynote Speaker // 中國大數據和網絡安全國際博覽會Cyberspace Adminsitration Of China (Cac) // 中國網路管理委員會 May 2017 - May 2017Featured Foreign Cyber Security Keynote Speaker China Big Data and Cyber Security International Expo // 中國大數據和網絡安全國際博覽會http://www.bigdata-expo.org/http://www.cac.gov.cn/
-
Featured Keynote Speaker - Knowfar Institute For Strategic And Defence Studies (Kisds)軍事合作 - 人民解放軍 // Military Cooperation - People'S Liberation Army (Pla) Jan 2017 - Jan 2017UNCLASSIFIED簡報作為與人民解放軍(PLA)軍隊合作的一部分,由Knowfar戰略和國防研究所(KISDS)在中國上海和北京,中華人民共和國UNCLASSIFIED Briefings as part of Military Cooperation with People's Liberation Army (PLA) sponsored by Knowfar Institute for Strategic and Defence Studies (KISDS) in both Shanghai and Beijing, People's Republic of China
-
InstructorNato Cooperative Cyber Defence Centre Of Excellence (Ccdcoe) Dec 2015 - Apr 2016NATO - SECRET
-
Keynote Speaker - China'S Hackers And Cyber SovereigntyCyphercon Mar 2016 - Mar 2016Keynote Speaker - China's Hackers and Cyber Sovereigntyhttp://cyphercon.com/
-
Information Security Information ResearcherRed Dragon Rising Publishing Aug 2011 - Mar 2016Current recent publications include:August 2015: Chinese Cyber Crime: China's Hacking UnderworldFebruary 2014: "China’s Plans for Winning Information Confrontation"...ISBN-13: 978-1496080875January 2014: "Chinese Information Warfare Doctrine Development" 1994 - 2014...ISBN-13: 978-1493771974 2013: "China's Use of Computers & Networks as a Weapon System" ...ISBN: 978-1482577105
-
Chief Cyber Security Strategist |Author |Speaker |Blogger|Red Dragon Rising Publishing Jun 2001 - Apr 2013Provide consultation in these distinct cyber areas of emphasis:- Cyber-crime Investigation and Response- Incident Handling & Response- Penetration TestingFocused specialties include:- Red Teaming - physical and cyber- Digital Forensic Profiling and Social Engineering- Unconventional Nation State Cyber-Attack Vectors Extensive experience in physical facility anti-terrorism and force protection vulnerability identification and mitigation
-
Strategic Information SecurityReddragon1949 Jul 2011 - Mar 2016A simple author focusing on the Strategic Chinese Cyber Infiltration of commercial entities, primarily global 50 in size & scope; international governments, their intelligence, law enforcement & military organizations. Providing these critically important entities with substantive facts and actionable intelligence. Assisting with understanding how simple computer compromises are made using Mandarin, Simplified & Literary forms of the Chinese language.
-
Senior Principal Cyber Security EngineerSmiths Medical 2016 - 2016San Clemente, California, Us -
World Internet Conference (Wic)Cyberspace Administration Of China Dec 2015 - Dec 2015World Internet Conference (WIC), Cyberspace Administration of China
-
Featured Speaker - “China Cyber Soverignty & Impact On Big Data”Computer Measurement Group (Gmg) Nov 2015 - Nov 2015Featured Speaker- “China Cyber Soverignty & Impact on Big Data”
-
Keynote SpeakerInternational Information Integrity Institute I-4 Oct 2015 - Oct 2015CONFIDENTIAL - NOFORN
-
Keynote SpeakerParagon Development Systems (Pds) Oct 2015 - Oct 2015Oconomowoc, Wi, UsKeynote Speaker - “The Future of Chinese Cyber Warfare” . . . They would never hack my enterprise . . . would they? -
Book Signing & Speaker: 21St Chinese Cyber SovereigntyTrend Micro Cloudsec 15 Sep 2015 - Sep 2015Tokyo, Japan, JpTrend Micro CLOUDSEC 15Book Signing: Global Launch: Chinese Cyber Crime http://www.amazon.com/Chinese-Cyber-Crime-Hacking-Underworld/dp/1492985252Speaker: 21st Chinese Cyber Sovereignty Field experience-based and very current perspective of Chinese Cyberspace. An introduction and review of China's new national security law and draft cyberspace sovereignty legislation. -
Keynote Speaker - Nation State Motivations For Cyber EspionageThe Fraud And Cyber Crime Group, Queensland Police Service Aug 2015 - Aug 2015Keynote Speaker - Nation State Motivations for Cyber Espionage, 2015 Fraud & Cyber Crime Symposium,
-
Featured Guest SpeakerNational Defense Academy (防衛大学校) Jun 2015 - Jun 2015Featured Guest Speaker - National Defense Academy (防衛大学校)
-
Opening Keynote SpeakerComputer Management Group - Minneapolis Chapter Jun 2015 - Jun 2015Opening Keynote Speaker - Comparative Discussion of Nation State Cyber Doctrine Development
-
Keynote Speaker: Information Warfare In AsiaCtc Technology Corporation Jun 2015 - Jun 2015Keynote Speaker: Information Warfare in Asiahttp://www.mod.go.jp/index.html
-
Keynote Speaker - Isis Use Of Cyber WarfareKnowfar Institute For Strategic And Defense Studies May 2015 - May 2015Keynote Speaker - ISIS Use of Cyber Warfare
-
Keynote Speaker - Comparative Cyber Doctrine DevelopmentKnowfar Institute For Strategic And Defense Studies May 2015 - May 2015Keynote Speaker - Comparative Cyber Doctrine Development
-
Featured Foreign Keynote: Anti- & Counter Terrorism Efforts During The New Great GameKnowfar Institute For Strategic And Defense Studies May 2015 - May 2015Featured Foreign Keynote: Anti- & Counter Terrorism Efforts During the New Great Game
-
Keynote Speaker - Forensecure '15Illinois Institute Of Technology Apr 2015 - Apr 2015Chicago, Illinois, UsKeynote Speaker - FORENSECURE '15Binary Battlefield: Nation State Motivations for Cyber Actions, a discussion about real world field research vis-a-vis front line experiences from international motivations of cyber-enabled nation states including China, Iran, and Russia and the impact on your digital information world. -
Distinguished Speaker Jhu - Apl ColloquiumThe Johns Hopkins University Applied Physics Laboratory Apr 2015 - Apr 2015Laurel, Maryland, UsDistinguished Speaker JHU - APL Colloquium -
Featured Speaker: Chinese Military Cyber CapabilitiesCommand & Staff College, Marine Corps University, United States Marine Corps Apr 2015 - Apr 2015Featured Speaker: Chinese Military Cyber Capabilities
-
Cyber Threat Intelligence Researcher - Islamic Republic Of IranNorse Corporation Jul 2014 - Apr 2015Foster City, Ca, UsCyber Threat Intelligence Researcher - Islamic Republic of IranGhost writer for cyber threat intelligence report pertaining to Iran. -
Analyzing Nation State Cyber Warfare - Russia, Iran & North KoreaUniversity Of Wisconsin-River Falls Mar 2015 - Mar 2015River Falls, Wi, UsFeatured Guest Speaker - Analyzing Nation State Cyber Warfare - Russia, Iran & North Korea -
Featured Speaker - Evolution Of Chinese Cyber CapabilitiesUniversity Of Wisconsin-River Falls Mar 2015 - Mar 2015River Falls, Wi, UsFeatured Speaker - Evolution of Chinese Cyber Capabilities giving an economic, military and political review of the People’s Republic of China. -
Cyber Threat IntelligenceSaudi Aramco Mar 2015 - Mar 2015Dhahran, SaCyber Threat Intelligence -
Keynote SpeakerInternational Information Integrity Institute I-4 Mar 2015 - Mar 2015CONFIDENTIAL - NOFORN
-
Featured Speaker - 2015 Cyber Intelligence Briefing - People'S Republic Of ChinaLions Clubs International Jan 2015 - Jan 2015Oak Brook, Illinois, UsFeatured Speaker - 2015 Cyber Intelligence Briefing - People's Republic of ChinaSupporting my local business community regarding cyber education and impact on national security -
Featured Speaker - Why China Or Iran Would Target Us National Critical Infrastructure (Nci)S4X15 Digital Bond Jan 2015 - Jan 2015Featured Speaker - Why China or Iran Would Target US National Critical Infrastructure (NCI)…Chinese & Iranian Compromises of US National Critical Infrastructurehttp://www.digitalbond.com/s4/s4x14/
-
Panelist - Cyber Warfare Attribution/Retribution - RenditionS4X15 Digital Bond Jan 2015 - Jan 2015One of three paneslists discussing cyber warfare - Attribution/Retribution - Rendition
-
International Cyber War Games Duty Expert - Scenario AdjudicatorA British Conference Producer Jan 2015 - Jan 2015International Cyber War Games Duty Expert - Scenario Adjudicator
-
Conference Chairman - Cyber Defence And Network Security (Cdans)A British Conference Producer Jan 2015 - Jan 2015Third consecutive year as Conference Chairman - Cyber Defence and Network Security (CDANS)
-
Featured SpeakerA British Conference Producer Dec 2014 - Dec 2014NEW THREATS TO GCC CYBER SECURITY: UNCOVERING REGIONAL VULNERABILITIES AND AN ANALYSIS OF THOSE WHO WOULD EXPLOIT THEM
-
Interactive Workshop LeaderA British Conference Producer 2014 - Dec 2014Interactive Workshop: UNDERSTANDING AND DEFENDING AGAINST EMERGING CYBER THREATS
-
Featured Speaker Secure 2014Nask Oct 2014 - Oct 2014Warszawa, Mazowieckie, PlFeatured Speaker SECURE 2014Comparative Analysis of Chinese & Russian Criminal Cyber Hacking Initiativeshttp://www.secure.edu.pl/prelegenci.php -
Featured Briefer: Anti & Counter-Terrorism Lessons For The People'S Republic Of ChinaKnowfar Institute (A Chinese Defence Think Tank) Sep 2014 - Oct 2014Featured Briefer: Anti & Counter-Terrorism Lessons for the People's Republic of China
-
Featured Briefer: Cyber ConflictCentral Military Commission (Oga) Sep 2014 - Oct 2014NOFORNRecognized by the People's Republic of China as the most knowledgeable and influential foreign expert on China's Military Information Warefare initiatives...October 2014
-
Featured SpeakerTel Aviv University - 4Th Annual International Cybersecurity Conference Sep 2014 - Sep 2014Tel Aviv, IlFeatured SpeakerTel Aviv University - 4th Annual International Cybersecurity Conference -
Featured Guest SpeakerSociety Of Former Special Agents Of The Fbi, Inc. Sep 2014 - Sep 2014Featured Guest Speakerhttp://www.socxfbi.org/
-
NofornMinistry Of Foreign Affairs Of Israel Sep 2014 - Sep 2014Jerusalem, IlNOFORN -
Opening Keynote SpeakerSecurity B-Sides Msp Aug 2014 - Aug 2014Minneapolis, Mn, UsOpening Keynote Speaker -
Opening Keynote SpeakerAustralian Institute Of Professional Intelligence Officers (Aipio) Aug 2014 - Aug 2014Opening Keynote Speaker for Annual Australian Institute of Professional Intelligence Officers (AIPIO) Conference
-
Confidential - NofornUnspecified Oga Jun 2014 - Jul 2014CONFIDENTIAL - NOFORN
-
Featured Presentation: Chinese Cyber Espionage: Fact Or Friction For Australia'S Cyber HealthAustralian Computer Society Jun 2014 - Jun 2014Sydney, Nsw, AuFeatured Presentation: Chinese Cyber Espionage: Fact or Friction for Australia's Cyber Health -
Foreign Military Cyber Doctrine DevelopmentMarine Corps Intelligence Activity (Mcia) - Quantico Jun 2014 - Jun 2014Provided an in-depth international research and operational experience based briefing on Foreign Military Cyber Doctrine Development with a special emphasis on the following countries Islamic Republic of Iran, Russian Federation and People's Republic of China.
-
Foreign Military Cyber Doctrine DevelopmentMarine Corps Warfighting Laboratory Jun 2014 - Jun 2014Provided an in-depth international research and operational experience based briefing on Foreign Military Cyber Doctrine Development with a special emphasis on the following countries Islamic Republic of Iran, Russian Federation and People's Republic of China.
-
Keynote SpeakerInternational Information Integrity Institute I-4 Jun 2014 - Jun 2014CONFIDENTIAL - NOFORN
-
Cyber Course DesignDiplomatic Language Services May 2014 - Jun 2014Arlington, Va, UsCyber Course Design -
Senior Research AnalystWikistrat Jan 2012 - Jun 2014Washington, District Of Columbia, UsProvide military, apolitical and analysis regarding a myriad of task oriented subjects across the entire global geo-political spectrum... -
Featured Speaker - Comparing China, Iran & North Korean Hacking WorldsPositive Hack Days - Phd 2014 May 2014 - May 2014Featured Speaker - Comparing China, Iran & North Korean Hacking Worlds
-
Keynote SpeakerInternational Information Integrity Institute I-4 Mar 2014 - Mar 2014CONFIDENTIAL - NOFORN
-
Keynote Speaker - People'S Republic Of China Cyber ConflictSecure Computing Forum 2014 - Mar 2014 - Mar 2014Keynote Speaker - People's Republic of China Cyber Conflict
-
Session Moderator - New Trends And Solutions For Digital ThreatsGcc Digital Security Forum Feb 2014 - Feb 2014Session Moderator - New Trends and Solutions for Digital Threats A discussion about the current and emerging securing cyber threats as well as solutions and defense potentials in a global and Gulf context: Sources of threats and defense strategies Activities and institutions most vulnerable to penetration. Classical sources of threats and digital intrusions Cost of digital crimes Encryption, data centers, SCADA and other solutions Cloud Computing as a solution posing new threat
-
Session Moderator: Session 5: Approaches And Strategies For Major Industries In GccGcc Digital Security Forum Feb 2014 - Feb 2014Session Moderator: Session 5: Approaches and Strategies for Major Industries in GCCEach presentation will highlight need and approach taken by major industries in cyber security. Industries to be addressed are: Critical Infrastructure, Banking and financial markets and telecommunications.
-
Featured Speaker - Iranian Cyber InitiativesInformation Systems Security Association - Mn Chapter Jan 2014 - Jan 2014Featured Speaker - Iranian Cyber Initiatives
-
Featured Speaker:Comparative Study: Iran, Russia & Prc Cyber DoctrineComputer Defence & Network Security Conference 2014 Jan 2014 - Jan 2014Featured Speaker:Comparative Study: Iran, Russia & PRC Cyber DoctrineNation State Motivations for Using the Cyber Realm – Comparative Study of Islamic Republic of Iran, Russian Federation & the People’s Republic of China (中華人民共和國).
-
Conference ChairComputer Defence & Network Security Conference 2014 Jan 2014 - Jan 2014Conference Chair for Computer Defence & Network Security Conference 2014
-
Featured Workshop: Chinese Cyber Criminals Tactics, Technology & ProtocolsComputer Defence & Network Security Conference 2014 Jan 2014 - Jan 2014Featured Workshop:Chinese Cyber Criminals Tactics, Technology & Protocols(21st Century Cyber TTPs)Key Learning Point #1 –Chinese Cyber Criminals - Tactics, Techniques & Procedures (TTPs)Key Learning Point #2 –Direct Cyber Security Threat Impact by Chinese Cyber CriminalsKey Learning Point #3 –Operational picture & CONOPS of Chinese Cyber Underground
-
Featured Rant: How China'S Strategic Use Of Comprised Computer Systems Has Colonised BritainAcumin Consulting Jan 2014 - Jan 2014London, GbFeatured RANT: How China's Strategic Use of Comprised Computer Systems Has Colonised BritainFor the frst RANT Forum of 2014 William Hagestad II, Author & International Cyber Threat Researcher, will be presenting his talk, "How China's Strategic Use of Comprised Computer Systems Has Colonised Britain."In this presentation LtCol Hagestad will discuss the Chinese economic, military and political colonisation of Britain through the strategic use of compromising networks and computers systems as part of the People's Republic of China's non-military invasion of the United Kingdom... -
Featured Speaker: Op Middle Kingdom: How China Uses Networked Computer Systems To HackMinnesota Government It Symposium Dec 2013 - Dec 2013Featured Speaker: OP Middle Kingdom: How China Uses Networked Computer Systems to HackSecurity Track — Level: AdvancedOP Middle Kingdom: How China Uses Networked Computer Systems to HackWilliam Hagestad II, International Author & Speaker, Red Dragon Rising - People's Republic of Chinese Strategic Cyber Infiltration Tactics, Techniques & ProceduresThis session will address the following: 1) "China Challenges: Target ~ United States: People's Republic of China’s use of Computers and Networks as a Strategic Weapon;" 2) Facts of Chinese history of cyber risk and economic reward as it directly applies to the United States, and 3) Fundamental elements of the Official Communist Party, People’s Liberation Army and their direct involvement in Chinese commercial enterprises.In this session, you will learn:Latest cyber threat intelligence impacting US government and commercial interestsDark world of the Chinese hacker community - learn what they are using to hack our organizationsFrom other like-minded professionals who will ask questions related to the security of their enterprise from foreign cyber hacking & espionage
-
China Challenges: Target India – People’S Republic Of China Targeting IndiaGround Zero Summit Nov 2013 - Nov 2013China Challenges: Target India – The People’s Republic of China use of computers & networks as a strategic weapon.
-
Foreign Panelist: Panel Discussion On Surveillance, Privacy & Cyber EspionageGround Zero Summit Nov 2013 - Nov 2013Foreign Panelist: Panel discussion on surveillance, privacy & cyber espionage in wake of PRISM
-
Guest Speaker ~ Islamic Republic Of Iran Cyber WarfareCentury College Nov 2013 - Nov 2013White Bear Lake, Mn, UsGuest Speaker ~ Islamic Republic of Iran Cyber Warfare -
Internationally Published Author: 21St Century Chinese CyberwarfareIt Governance Apr 2011 - Nov 2013Ely, Cambridgeshire, GbUnderstand 21st Century Chinese Cyber Warfare and Confront the Red DragonOrder now at either:Option # 1) http://red-dragonrising.com/Option # 2) http://www.amazon.com/21st-Century-Chinese-Cyberwarfare-Governance/dp/1849283346ISBN: 9781849283342Pages: Circa 364Format: PaperbackPublished date: March 2012Availability: NOW - currently available -
Featured Speaker: Operation Middle KingdomXvii Conference On Telecommunications And It Security Oct 2013 - Oct 2013Featured Speaker @ SECURE 2013Operation Middle Kingdom. People's Republic of China: Use of the Computer as a Strategic & Economic Weapon Systemhttp://www.secure.edu.pl/en/index.php
-
Keynote Speaker - Chinese Cybercrime History & Ttps: Impact On The United KingdomPayments Council Oct 2013 - Oct 2013Keynote Speaker - eCrime and Cyber Security Seminar 2013 ~ Chinese Cybercrime History & TTPs: Impact on the United Kingdom
-
Chinese Cyber Infiltration: Us Critical Infrastructure Security And ResilienceConfidential Icw Presidential Policy Directive/Ppd-21 Oct 2013 - Oct 2013Chinese Cyber Infiltration: US Critical Infrastructure Security and ResilienceImpact & Affect on US Petroleum Manufacturing & Distribution Capabilityhttp://www.dhs.gov/chemical-sector
-
Chinese Cyber Infiltration: Emergency Services, Us Critical Infrastructure Security And ResilienceConfidential Icw Presidential Policy Directive/Ppd-21 Oct 2013 - Oct 2013Chinese Cyber Infiltration: US Critical Infrastructure Security and ResilienceImpact & Affect on US Emergency Services Sector Capabilityhttp://www.dhs.gov/emergency-services-sector
-
Keynote Speaker - Information Assurance DayThe University Of Findlay Oct 2013 - Oct 2013Findlay, Ohio, UsKeynote Speaker - Information Assurance DayPresented a series of cyber infiltration topics -
Opening Keynote SpeakerRsa Conference Europe Oct 2013 - Oct 2013Opening Keynote Speaker in RSA Conference's Advanced Track: Hacker & Threats HTA-W01Comparative Study: Islamic Republic of Iran, Russia Federation & the People's Republic of China Cyber WarPresentation material included comprehensive research conducted via OSINT, Direct HUMINT and extensive global field experience.
-
Keynote Speaker - The Hacking Forces Emerging From The People'S Republic Of ChinaFraud And Corporate Crime Symposium 2013 ~ Queensland Police Service Sep 2013 - Sep 2013Brisbane, Queensland, AuKeynote Speaker - The Hacking Forces Emerging from the People's Republic of China @ the Fraud and Corporate Crime Symposium 2013 ~ Queensland Police Service -
AdvisorFraud & Corporate Crime Group (Fccg) Sep 2013 - Sep 2013NOFORN
-
Keynote Speaker - Technolutianary DayMsp Cmg Fall 2013 Conference Blue Cross And Blue Shield Of Minnesota Sep 2013 - Sep 2013Eagan, Mn, UsKeynote Speaker - Technolutianary DayChinese Cyber Espionage: Infiltration via UTF-8 vs UTF-16… the 2 Byte BinaryAgenda ~Current Events…People's Republic of China's ViewWestern View of ChinaCVE’s & MD5 HashesGCCSUTF…Comparing Single vs Double ByteChinese Linux -
Featured SpeakerGeneral Dynamics Fidelis Cybersecurity Solutions Sep 2013 - Sep 2013Riverside, Ca, UsIntroduction to the Cultural, Historical, Linguistic, Economic, Political and Military aspects of the People's Republic of China. A review of the dynamics presented in "21st Century Chinese Cyberwarfare" qualified as Strategic Chinese Cyber Infiltration. -
Featured Keynote Speaker - International Session: Comparative Study: Iran, Russia & Prc Cyber WarHitcon 2013 Jul 2013 - Jul 2013Comparative Study: Iran, Russia & PRC Cyber WarNation State Motivations for Using the Cyber Realm – Comparative Study of Islamic Republic of Iran, Russian Federation & the People’s Republic of China (中華人民共和國)…International governments including the Islamic Republic of Iran, Russian Federation and the People’s Republic of China (中華人民共和國) all have very well developed cyber capabilities both offensively and defensively; this is the Western world view. During this presentation a foreigner’s international experience reviewing, studying and researching these three nation states will be presented. Included in this 360 degree review will be both the Western/foreigner’s perspective and the distinct motivations by each country to feel compelled to develop such technologically advanced national security weapons in the information realm.The international lens used to review the nation state cyber weapons platform development will incorporate cultural, historical, linguistic, military, political and technological foci…
-
SpeakerCib Jul 2013 - Jul 2013NOFORN
-
International Keynote - Operation Middle Kingdom People'S Republic Of China Cyber Targeting: AusAustralian Defence Magazine - 3Rd Annual Cyber Security Summit Jun 2013 - Jun 2013Facts of Chinese history of cyber risk and economic reward as it directly applies to AustraliaFundamental elements of the Official Communist Party, People's Liberation Army and their direct involvement in Chinese Electronic & Information Warfare, specifically related to the Country of Australia will be presented, reviewed and discussed.Distinct cyber rules of engagement in participating with the Chinese State will be presented as well as suggested short and long term moves for future confidential successes in the People's Republic of China. In conclusion, specific recommendations and suggestions for future actions will be offered as well as an opportunity for detailed question and answer.http://www.admevents.com.au/defence-conference/cyber-security-conference
-
Workshop Leader: Chinese Cyber Espionage & Operation Middle KingdomAustralian Defence Magazine 3Rd Annual Cyber Security Summit Jun 2013 - Jun 2013Workshop Leader: Chinese Cyber Espionage & Operation Middle Kingdom Specific Sessions provided to an Australian Defence & Intelligence audience:第一節:共產黨在中國(中共)人民解放軍(解放軍)的關鍵人物Session 1: Key Personalities within the Communist Party of China (CPC) & People‘s Liberation Army (PLA)第二:中國人民共和國表示官方的政策,對信息化綜合網絡電子戰(INEW)Session 2: People’s Republic of China stated official policies on informization & integrated network electronic warfare (INEW)會議三:在中國使用網絡代碼衝突的深入審查 - 15年以上的歷史Session 3: In-depth review of the Chinese use of cyber code conflict - a 15+ year history第四:“沒有限制的戰爭” - 為中國的網絡衝突的原則和交戰規則(淨資產收益率)Session 4: Examination of “War Without Limits” - Principles & Rules of Engagement (ROE) for Chinese Cyber Conflict第五:在中國 境內的黑客是誰?Session 5: Who are the hackers within China?第六: 案例研究在中國網絡間諜 - 各國政府,軍事,情報和經濟目標Session 6: Case Studies in Chinese Cyber Espionage - Governments, Military, Intelligence & Economic Targets第七: 結論的短期和長期移動Session 7: Conclusions with both Short and Long Term Moves
-
Guest Speaker - People'S Republic Of China: Computers & Networks As A Weapons PlatformCentury College Information Technology Association May 2013 - May 2013Guest Speaker - People's Republic of China: Computers & Networks as a Weapons Platform
-
Keynote Speaker: Military Cyber Command Comparison China, Iran & RussiaCentral Ohio Issa May 2013 - May 2013Columbus, Ohio, UsKeynote Speaker: Military Cyber Command Comparison People's Republic of China, Islamic Republic of Iran & Russia Federation...contact me for the one page Military Cyber Command Comparison Cheat Sheet -
Current Cyber Threat Intelligence Briefing: 中華人民共和國 & 中國人民解放軍M S I Conservatory May 2013 - May 2013Current Cyber Threat Intelligence Briefing: 中華人民共和國 & 中國人民解放軍(Invitation Only - NOFORN)
-
Comparative Study: Iran, Russia & Prc Cyber Conflict (War)Secure 360 Security Conference - May 2013 - May 2013Comparative Study: Iran, Russia & PRC Cyber Conflict (War)A review of the People's Republic of China, Russian Federation and Islamic Republic of Iran official cyber doctrinal development - through a technical, linguistic, cultural, historical, military, political and geo-strategic threat response perspective.http://secure360.org/schedule/comparative-study-iran-russia-prc-cyber-war/
-
Featured Speaker: People'S Republic Of China Use Of Computers & Networks As A Strategic WeaponAuscert May 2013 - May 2013Brisbane, Queensland, AuFeatured Speaker @ AusCERT 2013:China Challenges: Target ~ Australia: People's Republic of China use of Computers & Networks as a Strategic Weapon -
Cyber Security Speed Debate PanelistAuscert May 2013 - May 2013Brisbane, Queensland, AuCyber Security Speed Debate Panelist -Debated both positive and negative sides of key cyber security issues related to the People's Republic of China - including political, economic, military, intelligence, historical and linguistic aspects of Operation Middle Kingdom.Fellow debate panelists included:Speed Debating Panel. Chair: Adam Spencer, Mathematician, Comedian and Australian Media PersonalityPanelists: Bill Caelli, Adrian Covich, Mark Fabro, Bill Hagestad, Eugene Kaspersky, Charlie Miller, Scott McIntyre, Marcus Ranum, Jim Watson
Bill H. Education Details
-
College Of Computer Science & Engineering (Cse), University Of Minnesota Graduate SchoolSecurity Technologies - Cyber Warfare & Information Security Emphasis -
Fbi - Los Angeles Field Office - InfragardAdvanced Osint Techniques & Methodologies -
Sans Technology InstituteSec487: Open-Source Intelligence (Osint) Gathering And Analysis -
Fbi - Los Angeles Field Office - InfragardAdvanced Osint Techniques (Aot) Level 2 -
Fbi - Los Angeles Field Office - InfragardAdvanced Osint Techniques (Aot) Level 3 -
Fbi - Los Angeles Field Office - InfragardAdvanced Osint Techniques (Aot) Level 4 -
Fbi - Los Angeles Field Office - InfragardAdvanced Osint Techniques (Aot) Level 1 -
Fbi - Los Angeles Field Office - InfragardOpen Source Intelligence Sources & Content -
Fbi - Los Angeles Field Office - InfragardFundamentals Of Open Source Intelligence - Level 1 Of 6 -
Fbi - Los Angeles Field Office - InfragardOsint -
Fbi - Los Angeles Field Office - InfragardOpen Source Intelligence (Osint) Level 5 Of 6 -
Fbi - Los Angeles Field Office - InfragardOpen Source Intelligence (Osint) Level 6 Of 6 -
Fbi - Los Angeles Field Office, InfragardOpen Source Intelligence Research & Socmint Level 2 Of 6 -
Sans Technology InstituteCyber Threat Intelligence (Cti) -
Usmc Command & Staff CollegeMilitary Security Policy And Strategy -
Technological Leadership InstituteManagement Of Technology -
Usmc Amphibious Warfare School (Aws)Amphibious & Expeditionary Warfare Planning & Operations -
University Of MinnesotaMandarin Chinese; Modern Japanese -
Nankai UniversityModern Mandarin Chinese -
Fbi - Infragard Los AngelesIntermediate Open Source Intelligence (Osint)
Frequently Asked Questions about Bill H.
What company does Bill H. work for?
Bill H. works for Red Dragon 1949 // 紅龍1949年
What is Bill H.'s role at the current company?
Bill H.'s current role is Chinese Diplomatic, Information and Intelligence, Military and Economic Researcher.
What is Bill H.'s email address?
Bill H.'s email address is ha****@****ing.com
What schools did Bill H. attend?
Bill H. attended College Of Computer Science & Engineering (Cse), University Of Minnesota Graduate School, Fbi - Los Angeles Field Office - Infragard, Sans Technology Institute, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office, Infragard, Sans Technology Institute, Usmc Command & Staff College, Technological Leadership Institute, Usmc Amphibious Warfare School (Aws), University Of Minnesota, Nankai University, Fbi - Infragard Los Angeles.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial